An investigation on the generative mechanisms of Dark Net markets

Size: px
Start display at page:

Download "An investigation on the generative mechanisms of Dark Net markets"

Transcription

1 An investigation on the generative mechanisms of Dark Net markets Paolo Spagnoletti 1 Department of Business and Management, LUISS University, Roma, Italy Federica Ceci Department of Economics and Management, G. d Annunzio University, Pescara, Italy Bendik Bygstad Department of Informatics, University of Oslo, Oslo, Norway ABSTRACT In this paper we investigate the Dark Net which is the part of Internet accessible only via special browsers such as Tor. The Dark Net is the home of black-markets for illegal goods and services such as drugs, weapons and fake identities. In this study we investigate the Dark Net as a digital infrastructure over time to address the following research question: what are the forces underlying Dark Net markets? Our empirical approach is based on a set of techniques for accessing Dark Net marketplaces (DNM) and collecting various types of information on sites, transactions and users. We draw also on secondary sources such as reports of police interventions and interviews. Our analysis follows the tradition of critical realism to shed light on the generative mechanisms enabling Dark Net markets to operate and survive. 1 Corresponding author. pspagnoletti@luiss.it

2 Keywords: Dark Net marketplace, black-market, generative mechanism, critical realism, cyber threat intelligence INTRODUCTION The illegal black markets that exist in the Dark Net can be considered the evil Mr. Hydes of the Internet, the ugly market of illegal drugs, guns, child porn and stolen documents. It is the place where the innovative power of technology is used for illegal and unethical purposes, and certainly is a place that most of us would not want to visit. It is a place that most of us prefer to ignore. In this paper, we argue that this disregard is unfortunate for two reasons. First, the Dark Net is a fact of the digital world, and increasing one. As Bartlett (2014) describes, the Dark Net is a strange mixture of crime and idealism, including both dissident sites, drug markets, terrorism and many things between, and should be researched as a global phenomenon. Second, the criminal part of the Dark Net, fueled by cryptocurrencies such as Bitcoin, is a real and serious threat (Europol 2017), and we need knowledge about it in order to mitigate the risks generated by its users (Kethineni et al. 2017; Samtani et al. 2017). Recent studies show how the Dark Net is contributing to the rise of new forms of crime by providing platforms supporting criminal interactions (Spagnoletti et al. 2018). Dark Net Marketplaces (DNMs) are facilitating illicit trade in hacking services (e.g. renting a Botnet or a Thingbot), fake identity documents and stolen information (Odabas et al. 2017) useful to conduct online fraud through spear phishing and advanced persistent threats (Chaudhry 2017; Hurlburt 2017; Kraemer-Mbula et al. 2013; Samani 2016). 2

3 DNMs - described also as cryptomarkets or black-markets - are e-commerce platforms supporting interactions between the buyers and sellers of illegal goods. Therefore, DNMs combine Dark Net capabilities for anonymous surfing with traditional e-commerce functions. Moreover, to conceal payments and money laundering cryptocurrencies are often used in DNMs. Specialized law enforcement agencies (LEA) units survey and occasionally raid these web sites, an example being when the US Federal Bureau of Investigation (FBI) closed the Silk Road site in 2013 (Soska and Christin 2015). Despite growing international cooperation among private and public institutions, attribution is hard for LEAs given the anonymity of interactions. DNMs enable new forms of crime that take advantage of digital capabilities, anonymity and online collaboration and are difficult to fight by focusing only on observable events. The situation calls for an interdisciplinary and multi-level reconceptualization of Dark Net infrastructures. This effort should be accompanied by critical analysis and the exploratory power of social science to stimulate sense-making processes and make decision-making more effective. We conceptualize Dark Nets as digital infrastructures where anonymity is a necessary condition for the active engagement of participants in online interactions. In digital infrastructures heterogeneous and autonomous human or organizational actors use information technology to allow adaptation to each other and their external environments (Hanseth and Lyytinen 2010; Henfridsson and Bygstad 2013). However, the anonymity of the technological and human components in Dark Nets can make this adaptation processes problematic and have a negative impact on infrastructure functioning. Our research questions are: how are digital 3

4 infrastructures generated under conditions of anonymity? What are the underlying mechanisms that explain the functioning of the Dark Net infrastructure? In this study, we approach the Dark Net from both an empirical and a theoretical view. Empirically, we triangulate archival data from secondary sources with primary data obtained from interviews with LEA agents. We access the Dark Net using specially designed software that allows collection of substantial amounts of information on sites, anonymous actors, communications and transactions. Theoretically, we conduct an in-depth critical realist analysis which reveals the underlying forces shaping the evolution of the Dark Net infrastructure. We identify three generative mechanisms, i.e. Cybercrime scaling, Black platformization, Dark Net resilience. These causal structures explain how cybercrime is fueled by illegal trading, hacking and collective recovery within regular market operations and breakdowns. Compared to other empirical contexts, breakdown events are more frequent in the Dark Net, and therefore are easier to observe. This allows a deeper understanding of the innovation dynamics occurring within digital infrastructures. Moreover, we shed light on the governance of global information infrastructures, identifying how interactions among multiple actors with different roles (hackers, criminal communities, LEAs agents, buyers and vendors) shape the functionalities and characteristics of the Dark Net infrastructure. THEORETICAL LENS: DARK NET AS DIGITAL INFRASTRUCTURE 4

5 The term digital infrastructure 2 encompasses a socio-technical interconnected structure of systems, people and organizations. Examples include Internet, financial systems, Facebook and airline booking systems. The extant literature on digital infrastructures studies the phenomenon in several contexts such as Internet development (Hanseth and Lyytinen 2010), scientific infrastructures (Edwards et al. 2013), the evolution of mobile platforms (Eaton et al. 2015) and commercial developments. Digital infrastructures can be considered as an organizational phenomenon; they include both technical solutions and also the organizations and people that leverage the services. They also include the development and knowledge communities that produce the solutions and the support functions. Many infrastructures include several million people, organized in digital ecosystems. The literature highlights some key attributes: (i) digital infrastructures are different from traditional information systems; they are heterogeneous, often with no dominant actor (Hanseth and Lyytinen 2010); (ii) the dynamics of digital infrastructures are different; they are not designed but evolve through innovation, adoption and scaling (Henfridsson and Bygstad 2013). Therefore, digital infrastructures are comprised of computing and network resources which allow multiple stakeholders to orchestrate their service and content needs by exploiting the externalities of digital platforms (Constantinides et al. 2018). 2 Also called information infrastructures or cyberinfrastructures 5

6 In this paper we adopt a broad definition of Dark Net, intended as the portion of the Internet providing digital capabilities to clandestine groups that design, implement and maintain its functionality. There are few studies of the Dark Net that adopt this perspective but there is a line of organizational research on terrorist and drug organizations. For instance, Milward and Raab (2006) found that resilient dark networks manage to rebalance differentiation and integration mechanisms in their internal structure and adjust to the new requirements. Therefore, they are difficult to break. What is less well known is how the interplay among the digital and social elements produces the observed outcomes. It is reasonable to expect that some mechanisms operating in traditional and legal digital infrastructures will work also in the Dark Net. However, it is expected also that due to its particular technical and social structures, other and quite different mechanisms will exist. Our methodological approach is designed to reveal these. METHOD: DATA COLLECTION AND DATA ANALYSIS We take a critical realist case study approach (Bhaskar 1998; Mingers 2004; Wynn and Williams 2012) which requires comprehensive data collection, and in-depth data analysis, deploying retroduction to uncover causal mechanisms. We are looking not for regularities at the level of events but deeper level contingent (and generalizable) mechanisms operating on social and technical structures. The empirical context of our study is the ecosystem of the DNMs. We collected data from multiple sources: the characteristics of anonymity and secrecy of the markets and users analyzed make use of data triangulation and mixed methods especially important since no single 6

7 source can provide a complete picture of the phenomenon (Ferguson 2017). We collected data referring to the period 2009 to 2018, covering 10 years. The aim of our data collection was to obtain a full understanding of events, products, actors, processes and technologies occurring in a specific class of fraudulent practice: illegal trade in credit card information. Data were collected by a combination of crawling the Dark Net and analyzing open sources on the surface web. Table 1 presents an overview of our data collection strategies. We conducted a critical realist analysis aimed at uncovering the deeper causal structure explaining the empirical observations (Bhaskar 1998; Sayer 1994). We used the technique called retroduction (Wynn and Williams 2012). We built on the method described in Bygstad and Munkvold (2011) (Table 2 presents the process). We started by identifying key events. We define events as clusters of observations. Some events such as the establishment of Dark Net sites (Silk Road, BMR, Agora) and police interventions were obtained from secondary sources, others emerged from the data. These included sites offerings and the interactions among actors. Next we identified key components (assumed structural objects) of the case such as the Dark Net actors, the technologies and the users, and also the law enforcement actors. To assess the material collected, we conducted a theoretical re-description of our research object conceptualizing it as a digital infrastructure. This allowed a deeper analysis in the next step of retroduction in which retroduction of candidate mechanisms is crucial. Following Hedström and Swedberg (1996), we looked for three types of mechanisms: how structure influences action (macro-to-micro), how action triggers action (micro-to-micro), and how action reproduces or changes structure (micro-to-macro). 7

8 Table 1. Overview of data collection strategies Category Aim Data source Data collection method Data collected Events Products Actors Processes Evolution of the Dark Net Description of the illegal trade of financial documents and fake IDs Vendors, Buyers, Administrators and LEAs Understanding of security measures Open web: Way back machine, Deepdotweb.com, Darkwebnews.com Six Tor marketplaces: AlphaBay, Dream Market, Hansa, Leo, Outlaw and Bloomfield a) Deep web: Five Tor marketplaces: Alphabay, Dream, Hansa, Outlaw, Valhalla b) Police reports c) Interviews with LEA operators a) Deep web: DNMs b) Open web: Deepdotweb.com and Darkwebnews.com FINDINGS Identifying and counting activities per month Crawling the web site and extracting information by the use of the Scrapy tool Crawling the web site and extracting information by the use of the Scrapy tool Gathering of information on police operations Identification of relevant technologies and security mechanism Evolution of 122 marketplaces in the deep web. A dataset of 36 GB: AlphaBay (9120 offers), Dream Market (18506 offers), Hansa (13068) A dataset of PGP keys of vendors and buyers Process and operations by LEA Evolution of security functions implemented in DNM platforms In this short paper, we provide an overview of the evolution of DNMs in the past five years and discuss the mechanisms that explain the complex interactions among law enforcement, buyers and vendors of illegal goods and DNM platforms. We conduct an in depth analysis of the market for stolen data (e.g. credit card information) in which hackers - thieves sell information retrieved and services designed to acquire data and system-level access (Odabas et al. 2017). For space reasons, we provide only a short overview of the three mechanisms. 8

9 Figure 1. The establishment and termination of DNMs Figure 1 provides a fine grained depiction of the evolution of the DNMs. Our analysis identifies development between October 2013 and April 2018 and the number of active sites, and indicates some key events. The first Dark Net site of which there was some public awareness, Silk Road, was closed down by the FBI in November At that point, there were 6 active sites; this number had increased to more than 25 by summer The Onymous operation in October 2014 resulted in some of these sites being closed down. In April 2015, the Evolution site was closed down by the site administrators who pocketed the funds. However, in the months following the number of active sites increased. After a period of relative stability involving more than 20 active sites, in July 2017 Operation Bayonet reduced this number to 5. At the time of writing (October 2018), the number of DNM sites actives is still low (8). Through systematic retroduction we identified three high-level Dark Net mechanisms. Retroduction is a technique that looks for regularities not at the level of events but at the level of 9

10 causal mechanisms (Sayer 1994; Wynn and Williams 2012). These mechanisms operate on the structural elements and lead to observable events. Figure 2 provides a schematic illustration. Figure 2. Events, mechanisms and structure Mechanism 1: Cybercrime scaling The structure of a DNM is quite similar to the structure of any other two-sided platform, and enables vendors and buyers to trade at low transaction costs (Parker and Van Alstyne 2005). Similar to traditional e-commerce platforms such as Amazon and ebay, DNM buyers can be victims of different forms of deception such as non-delivery of items, product inauthenticity, misrepresentation and shill bidding (Grazioli and Jarvenpaa 2000, 2003; Yar 2016). This risk is accentuated in DNMs given the lack of transparency and the impossibility to recur to trusted third parties in the case of disputes. 10

11 However, our evidence on the evolution of DNMs (Fig. 1) shows that despite police interventions and exit scams, black-markets are flourishing and supporting buyers and vendors to trade illegal goods successfully online. How can buyer, vendor and platform owner trust one another? The volume of transactions handled by DNMs shows that it is relatively easy for a buyer to browse the offerings, select an object, purchase it anonymously and rate the vendor. Therefore, vendors can build reputation by providing additional services and information to guarantee the quality of the purchase. Examples include the functions for checking the validity of stolen credit cards and the refunding policies issued by vendors. On the side of platform owners, advanced trust functions such as escrow and PGP (Pretty Good Privacy) multisignature are implemented in DNMs to prevent deception. DNMs subsequent to Silk Road offer a larger variety of products and services such as credit card holograms, dumps, tools and guidelines for stealing and using stolen credit cards. These platforms activate network externalities by attracting new buyers and vendors and generating a cybercrime infrastructure. We describe this self-reinforcing mechanism as cybercrime scaling. We define cybercrime scaling as a process where a Cybercrime infrastructure enables vendors to build reputation, and successful purchases attract a critical mass of users to trade a greater variety of products and services. Mechanism 2: Black platformization The second mechanism identified is called black platformization. We observed above that the Dark Net infrastructure is a powerful resource for establishing a market in both stolen data and hacking tools. For instance, hackers can develop and sell new versions of malware and 11

12 provide instructions to deceivers using secure communication channels. Sets of personal data are sold to deceivers who conduct personalized phishing campaigns to perform large scale fraud using cryptocurrencies to collect payments and enable money laundering. Marketplace administrators constantly monitor the fast-evolving landscape of digital solutions and adapt their platforms by integrating functions to satisfy their users. Some blackmarkets specialize in serving a particular community, others serve different purposes. Therefore, DNMs can be conceptualized as digital platforms (Constantinides et al. 2018) enriched with new capabilities to follow the emerging needs of criminal communities. The Dark Net infrastructure consists of a combination of buyers, vendors and law enforcement agents adopting and innovating digital tools for anonymous interactions. The use of a virtual private network (VPN) to connect to the Tor network and install a new instance of a DNM (e.g. Silk Road 2) is an example of such interaction. We use the term platformization to emphasize the dynamic and volatile character of the innovation process taking place in the Dark Net infrastructure. Black platformization is driven by the urgency to react to the new means adopted by LEAs in identifying online trade of illegal goods. Such crowd-based innovation exploits the potential of hacker communities whose cooperation is supported heavily by digital platforms (Samtani et al. 2017; Spagnoletti et al. 2015). For instance, payments methods for illegal goods changed from centralized services offered by actors in non-collaborating countries (e.g. Liberty Reserve in Costa Rica between 2006 and 2013) to decentralized systems based on blockchain technology (e.g. Bitcoin), to more recent tumbling tools for cryptocurrencies. These architectural changes were triggered by increased cooperation among LEAs (Hui et al. 2017) and 12

13 advancements in attribution methods and tools (i.e. follow the money practices). We define black platformization as a process where the Dark Net infrastructure enables criminals to sell new digital products and DNM administrators enhance the security and efficiency of transactions by implementing new features crowdsourced from hackers and online communities. Mechanism 3: Dark Net resilience The specific characteristics of anonymous trade (i.e. anonymity, untraceability and illegality of the goods exchanged) lead to sudden and frequent interruptions to normal functioning. Such interruptions can be caused by sudden and unpredictable events such as an exit scam or a police operation. In the first case, the deceivers exploit the opportunity created by the presence in the escrow system of substantial amounts of money: the deceiver may simply transfer the crypto-currency to his or her own account, and close down the site leaving no traces of either vendors or buyers. In the case of police operations, LEAs seize sites and block the trade of illegal goods. There are observable consequences of those events. For instance, the number of DNMs significantly reduces after documented police raids, while the Sheep Market and Evolution exit scams provoked reactions from the communities of users. In the Sheep Market case, users coordinated to collectively discover and disclose the identity of the deceiver. In the Evolution case, there was an increase in the number of active sites (see Fig. 1). After a period of collective recovering involving various different actions, we observe changes to both the process and technologies of the Dark Net. For instance, after an exit scam, vendors move to more trusted sites with enhanced security functionalities. Similarly, criminals react to the surveillance 13

14 activities of the police and experiment with new attack schemas based on the adoption of advanced tools such as peer-to-peer markets and payment systems, and encrypted point to point channels for communication (e.g. Tor on VPN). We define Dark Net resilience as a process where the Dark Net infrastructure enables successful and unpredictable actions by deceivers and LEAs to cause a breakdown in normal market operations that leads to a collective recovery among the user community determining the morphing of technological and fraudulent schemas. Table 2 presents a summary of the mechanisms and their link to the empirical data. Table 2. Outcome of retroduction (adapted from Wynn and Williams (2012)) Mechanism Definition Key events Data sources Cybercrime scaling Black platformization Dark Net resilience Cybercrime infrastructure enables vendors to build their reputation and successful purchases attract a critical mass of users to trade a greater variety of products and services Dark Net infrastructure enables criminals to sell new digital products and DNMs admins enhance the security and efficiency of transactions by implementing new features crowdsourced from hackers and online communities Dark Net infrastructure enables successful and unpredictable actions of deceivers and LEAs to cause a breakdown in the normal market operation that leads to a collective recovery action by the user community determining the morphing of technological and fraudulent schema. Trusted credit card vendor Carder.su forum and card checking systems Liberty Reserve and Bitcoin Carding offerings in DNMs Malware and ransomware Dataset of personal data Escrow and private messages Multisignature, Finalize Early and Forced PGP Vendor Sheep market and Evolution exit scams Peer to peer markets and payments LEAs cooperation to Follow the money Onymous and Bayonet operations Newspapers, court documents, police reports, blogs, Gwern Alphabay scraping Newspapers, police reports, blogs, websites, Gwern, IA Newspapers, blogs, websites, IA, interviews with LEA, court documents, police reports 14

15 REFERENCES Bartlett, J The Dark Net: Inside the Digital Underworld. Bhaskar, R General Introduction, in Critical Realism: Essential Readings, M. S. Archer, R. Bhaskar, A. Collier, T. Lawson, and A. Norrie (eds.), London: Routledge, Ix Xxiv. Bygstad, B., and Munkvold, B. E In Search of Mechanisms. Conducting a Critical Realist Data Analysis, in Thirty Second International Conference on Information Systems, Shanghai, pp Chaudhry, P. E The Looming Shadow of Illicit Trade on the Internet, Business Horizons (60:1), Elsevier Ltd, pp ( Constantinides, P., Henfridsson, O., and Parker, G Platforms and Infrastructures in the Digital Age, Information Systems Research (7047), pp ( Eaton, B., Elaluf-Calderwood, S., Sørensen, C., and Yoo, Y Distributed Tuning of Boundary Resources: The Case of Apple s IOS Service System, MIS Quarterly (39:1), pp ( Edwards, P. N., Jackson, S. J., Chalmers, M. K., Bowker, G. C., Borgman, C. L., Ribes, D., Burton, M., and Calvert, S Knowledge Infrastructures : Intellectual Frameworks and Research Challenges, (Ann Arbor:). ( Europol Internet Organised Crime Threat Assessment (IOCTA) ( Ferguson, R. H Offline Stranger and Online Lurker: Methods for an Ethnography of Illicit Transactions on the Darknet, Qualitative Research (17:6), SAGE Publications Ltd, pp Grazioli, S., and Jarvenpaa, S. L Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers, IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans. (30:4), pp ( Grazioli, S., and Jarvenpaa, S. L Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence, International Journal of Electronic Commerce (7:4), pp ( Hanseth, O., and Lyytinen, K Design Theory for Dynamic Complexity in Information Infrastructures: The Case of Building Internet, Journal of Information Technology (25:1), Palgrave Macmillan, pp Hedström, P., and Swedberg, R Social Mechanisms, Acta Sociologica (39:3), pp Henfridsson, O., and Bygstad, B The Generative Mechanisms of Digital Infrastructure Evolution, MIS Quarterly (37:3), pp Hui, K., Kim, S. H., and Wang, Q Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks, MIS Quarterly (41:2), pp. 497-A11. 15

16 ( Hurlburt, G Shining Light on the Dark Web, Computer (50:4), IEEE Computer Society, pp ( Kethineni, S., Cao, Y., and Dodge, C Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes, American Journal of Criminal Justice, Springer New York LLC, pp ( Kraemer-Mbula, E., Tang, P., and Rush, H The Cybercrime Ecosystem: Online Innovation in the Shadows?, Technological Forecasting and Social Change (80:3), pp ( Milward, H. B., and Raab, J Dark Networks as Organizational Problems: Elements of a Theory, International Public Management Journal (9:3), Taylor & Francis, pp Mingers, J Real-Izing Information Systems: Critical Realism as an Underpinning Philosophy for Information Systems, Information and Organization (14:2), pp ( Odabas, M., Holt, T. J., and Breiger, R. L Governance in Online Stolen Data Markets, in The Architecture of Illegal Markets: Towards an Economic Sociology of Illegality in the Economy (Vol. 87). Parker, G. G., and Van Alstyne, M. W Two-Sided Network Effects: A Theory of Information Product Design, Management Science (51:10), pp ( Samani, R Cybercrime: The Evolution of Traditional Crime, in Beyond Convergence: World without Order, H. Matfess and M. Miklaucic (eds.), Washington, D.C.: Center for Complex Operations Institute for National Strategic Studies National Defense University, pp Samtani, S., Chinn, R., Chen, H., and Nunamaker, J. F Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence, Journal of Management Information Systems (34:4), Routledge, pp ( Sayer, A Method in Social Science. A Realist Approach, Routledge. Soska, K., and Christin, N Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem, 24th USENIX Security Symposium, pp Spagnoletti, P., Me, G., Ceci, F., and Andrea Prencipe Securing National E-ID Infrastructures: Tor Networks as a Source of Threats, in Organizing for the Digital World. IT for Individuals, Communities and Societies., F. Cabitza, C. Batini, and M. Magni (eds.), LNISO - Springer, pp Spagnoletti, P., Resca, A., and Lee, G A Design Theory for Digital Platforms Supporting Online Communities: A Multiple Case Study, Journal of Information Technology (30), pp ( Wynn, D., and Williams, C. K Principles for Conducting Critical Realist Case Study Research in Information Systems, MIS Quarterly (36:3), pp Yar, M Cybercrime and Society, (2 nd ed.), London: Sage. ( 16

17 17

Organisation designing though the practice of multi-method research in Information Systems

Organisation designing though the practice of multi-method research in Information Systems Organisation designing though the practice of multi-method research in Information Systems (extended abstract) Paolo Spagnoletti CeRSI-LUISS Guido Carli University, Roma, Italy pspagnoletti@luiss.it Purpose

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION. Bendik Bygstad University of Oslo IFIP 8.6 Aalborg 2.June 2014

THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION. Bendik Bygstad University of Oslo IFIP 8.6 Aalborg 2.June 2014 THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION Bendik Bygstad University of Oslo IFIP 8.6 Aalborg 2.June 2014 Research question Which mechanisms contingently cause digital infrastructure

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

IN SEARCH OF MECHANISMS. CONDUCTING A CRITICAL REALIST DATA ANALYSIS

IN SEARCH OF MECHANISMS. CONDUCTING A CRITICAL REALIST DATA ANALYSIS IN SEARCH OF MECHANISMS. CONDUCTING A CRITICAL REALIST DATA ANALYSIS Completed Research Paper Bendik Bygstad Norwegian School of IT 0185 Oslo, Norway bendik.bygstad@nith.no Bjørn Erik Munkvold University

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

the Companies and Intellectual Property Commission of South Africa (CIPC)

the Companies and Intellectual Property Commission of South Africa (CIPC) organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the

More information

Privacy, Technology and Economics in the 5G Environment

Privacy, Technology and Economics in the 5G Environment Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y

More information

TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES

TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES Trilateral Research Ltd. Crown House 72 Hammersmith Road W14 8TH, London + 44 (0)20 7559 3550 @Trilateral_UK

More information

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones School of Computing and

More information

GENERAL PRINCIPLES OF INTERNET GOVERNANCE

GENERAL PRINCIPLES OF INTERNET GOVERNANCE GENERAL PRINCIPLES OF INTERNET GOVERNANCE PROPOSAL OF THE FRENCH GOVERNMENT INTRODUCTION: THE VALUES OF THE INFORMATION SOCIETY The network has become a part of every nation s wealth and one of its most

More information

2 LEADING IN THE NEW IN PUBLIC SAFETY

2 LEADING IN THE NEW IN PUBLIC SAFETY Disruption is creating a new operating environment for public safety agencies: new threats, a need to identify, risk and harm from volume, meet increasing citizen expectation, to create new ecosystems,

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Interoperable systems that are trusted and secure

Interoperable systems that are trusted and secure Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,

More information

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016 Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in

More information

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY The Internet is changing the way that individuals launch businesses, established companies function, and

More information

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics? A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there

More information

MEDIA AND INFORMATION

MEDIA AND INFORMATION MEDIA AND INFORMATION MI Department of Media and Information College of Communication Arts and Sciences 101 Understanding Media and Information Fall, Spring, Summer. 3(3-0) SA: TC 100, TC 110, TC 101 Critique

More information

Researching Digital Drift

Researching Digital Drift Researching Digital Drift Andrew Goldsmith Russell Brewer Centre for Crime Policy & Research Digital Drift and the Internet Need to conceptualise the Internet in order to examine its significance as: A

More information

Book Review: The dotcrime Manifesto: How to Stop Internet Crime

Book Review: The dotcrime Manifesto: How to Stop Internet Crime Publications 2008 Book Review: The dotcrime Manifesto: How to Stop Internet Crime Gary C. Kessler Champlain College - Burlington, kessleg1@erau.edu Follow this and additional works at: https://commons.erau.edu/publication

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM)

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM) Homeland Security & Emergency Management (HSEM) 1 HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM) HSEM 501 CRITICAL ISSUES IN This course reintroduces the homeland security professional to the wicked problems

More information

A Hybrid Risk Management Process for Interconnected Infrastructures

A Hybrid Risk Management Process for Interconnected Infrastructures A Hybrid Management Process for Interconnected Infrastructures Stefan Schauer Workshop on Novel Approaches in and Security Management for Critical Infrastructures Vienna, 19.09.2017 Contents Motivation

More information

Social Data Analytics Tool (SODATO)

Social Data Analytics Tool (SODATO) Social Data Analytics Tool (SODATO) Abid Hussain 1 and Ravi Vatrapu 1,2 1 CSSL, Department of IT Management, Copenhagen Business School, Denmark 2 MOTEL, Norwegian School of Information Technology (NITH),

More information

Decentralisation, i.e. Internet for Social Good

Decentralisation, i.e. Internet for Social Good Decentralisation, i.e. Internet for Social Good Fabrizio Sestini DG CONNECT E3 (Next-Generation Internet) http://ec.europa.eu/digital-single-market/en/collectiveawareness * The personal views expressed

More information

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission Digital Identity Innovation Canada s Opportunity to Lead the World Digital ID and Authentication Council of Canada Pre-Budget Submission August 4, 2017 Canadian governments, banks, telcos, healthcare providers

More information

250 Introduction to Applied Programming Fall. 3(2-2) Creation of software that responds to user input. Introduces

250 Introduction to Applied Programming Fall. 3(2-2) Creation of software that responds to user input. Introduces MEDIA AND INFORMATION MI Department of Media and Information College of Communication Arts and Sciences 101 Understanding Media and Information Fall, Spring, Summer. 3(3-0) SA: TC 100, TC 110, TC 101 Critique

More information

GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT

GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT CRITICAL THINKING AT THE CRITICAL TIME ABOUT US The Global Risk and Investigations Practice (GRIP) of FTI Consulting is the leading provider of

More information

next generation internet Fabrizio Sestini, DG CONNECT

next generation internet Fabrizio Sestini, DG CONNECT next generation internet Fabrizio Sestini, DG CONNECT Vision for a "Next Generation Internet" IT-driven Business driven Right 2 disconnect Artificial Intelligence Immersive Interfaces Monopolies Centralization

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Enforcement of Intellectual Property Rights Frequently Asked Questions

Enforcement of Intellectual Property Rights Frequently Asked Questions EUROPEAN COMMISSION MEMO Brussels/Strasbourg, 1 July 2014 Enforcement of Intellectual Property Rights Frequently Asked Questions See also IP/14/760 I. EU Action Plan on enforcement of Intellectual Property

More information

Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems 1

Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems 1 Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems Prepared by Kevin C. Desouza 2 Foundation Professor, School of Public Affairs, Arizona State University Nonresident Senior

More information

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Running head: THE IMPACT OF COMPUTER ENGINEERING 1 Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper

More information

DiMe4Heritage: Design Research for Museum Digital Media

DiMe4Heritage: Design Research for Museum Digital Media MW2013: Museums and the Web 2013 The annual conference of Museums and the Web April 17-20, 2013 Portland, OR, USA DiMe4Heritage: Design Research for Museum Digital Media Marco Mason, USA Abstract This

More information

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES DIRK KRAFZIG MANAS DEB MARTIN FRICK DIGITAL COOKBOOK ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES For more details visit: https://digital-cookbook.com/ GRAPHIC DESIGN BY KNUT JUNKER AND DIETMAR

More information

Public Involvement in the Regional Sustainable Development

Public Involvement in the Regional Sustainable Development Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 62 ( 2012 ) 253 257 WC-BEM 2012 Public Involvement in the Regional Sustainable Development Mihaela Muresan a, Emilia

More information

Business Networks. Munich Personal RePEc Archive. Emanuela Todeva

Business Networks. Munich Personal RePEc Archive. Emanuela Todeva MPRA Munich Personal RePEc Archive Business Networks Emanuela Todeva 2007 Online at http://mpra.ub.uni-muenchen.de/52844/ MPRA Paper No. 52844, posted 10. January 2014 18:28 UTC Business Networks 1 Emanuela

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

NATIONAL TOURISM CONFERENCE 2018

NATIONAL TOURISM CONFERENCE 2018 NATIONAL TOURISM CONFERENCE 2018 POSITIONING CURAÇAO AS A SMART TOURISM DESTINATION KEYNOTE ADDRESS by Mr. Franklin Sluis CEO Bureau Telecommunication, Post & Utilities Secretariat Taskforce Smart Nation

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

Inter-enterprise Collaborative Management for Patent Resources Based on Multi-agent

Inter-enterprise Collaborative Management for Patent Resources Based on Multi-agent Asian Social Science; Vol. 14, No. 1; 2018 ISSN 1911-2017 E-ISSN 1911-2025 Published by Canadian Center of Science and Education Inter-enterprise Collaborative Management for Patent Resources Based on

More information

Our digital future. SEPA online. Facilitating effective engagement. Enabling business excellence. Sharing environmental information

Our digital future. SEPA online. Facilitating effective engagement. Enabling business excellence. Sharing environmental information Our digital future SEPA online Facilitating effective engagement Sharing environmental information Enabling business excellence Foreword Dr David Pirie Executive Director Digital technologies are changing

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO Brief to the Senate Standing Committee on Social Affairs, Science and Technology Dr. Eliot A. Phillipson President and CEO June 14, 2010 Table of Contents Role of the Canada Foundation for Innovation (CFI)...1

More information

The Case for ISO27001:2013

The Case for ISO27001:2013 The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher

More information

Towards a Software Engineering Research Framework: Extending Design Science Research

Towards a Software Engineering Research Framework: Extending Design Science Research Towards a Software Engineering Research Framework: Extending Design Science Research Murat Pasa Uysal 1 1Department of Management Information Systems, Ufuk University, Ankara, Turkey ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Compendium Overview. By John Hagel and John Seely Brown

Compendium Overview. By John Hagel and John Seely Brown Compendium Overview By John Hagel and John Seely Brown Over four years ago, we began to discern a new technology discontinuity on the horizon. At first, it came in the form of XML (extensible Markup Language)

More information

Foreword The Internet of Things Threats and Opportunities of Improved Visibility

Foreword The Internet of Things Threats and Opportunities of Improved Visibility Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Your information - but is it really yours?

Your information - but is it really yours? Your information - but is it really yours? www.privacy.org.nz DO YOU KNOW YOUR PRIVACY RIGHTS? You can have a lot of control over what happens to your information. Did you know: that you can ask to see

More information

CURRENSEE INITIAL GOLD BACKED COIN OFFERING

CURRENSEE INITIAL GOLD BACKED COIN OFFERING WHITE PAPER www.currensee.io CURRENSEE INITIAL GOLD BACKED COIN OFFERING 01 Currensee Initial Gold Backed Table Of Contents Introduction 02 Future of Cryptocurrencies 03 Gold on the Blockchain 04 Why CURRENSEE?

More information

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org

More information

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases Vol. 8 No. 20 ISSN -2233-9140 The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases KIM Gyu-Pan Director General of Advanced Economies Department

More information

IN Development in Platform Ecosystems Lecture 6: Information systems and complexity

IN Development in Platform Ecosystems Lecture 6: Information systems and complexity IN5320 - Development in Platform Ecosystems Lecture 6: Information systems and complexity 24th of September 2018 Department of Informatics, University of Oslo Magnus Li - magl@ifi.uio.no 1 Assignment 2

More information

Artificial intelligence and judicial systems: The so-called predictive justice

Artificial intelligence and judicial systems: The so-called predictive justice Artificial intelligence and judicial systems: The so-called predictive justice 09 May 2018 1 Context The use of so-called artificial intelligence received renewed interest over the past years.. Computers

More information

Exploring emerging ICT-enabled governance models in European cities

Exploring emerging ICT-enabled governance models in European cities Exploring emerging ICT-enabled governance models in European cities EXPGOV Project Research Plan D.1 - FINAL (V.2.0, 27.01.2009) This document has been drafted by Gianluca Misuraca, Scientific Officer

More information

Integrated Transformational and Open City Governance Rome May

Integrated Transformational and Open City Governance Rome May Integrated Transformational and Open City Governance Rome May 9-11 2016 David Ludlow University of the West of England, Bristol Workshop Aims Key question addressed - how do we advance towards a smart

More information

Digital Health Startups A FirstWord ExpertViews Dossier Report

Digital Health Startups A FirstWord ExpertViews Dossier Report AM PL E PA G ES S A G ES S A FirstWord ExpertViews Dossier Report Published Copyright 2016 Doctor s Guide Publishing Limited All rights reserved. No part of this publication may be reproduced or used in

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union

Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Dmitry Krupsky Head of Department of Economy of Innovation Activity, Ministry of Economy of the Republic

More information

Program Automotive Security and Privacy

Program Automotive Security and Privacy FFI BOARD FUNDED PROGRAM Program Automotive Security and Privacy 2015-11-03 Innehållsförteckning 1 Abstract... 3 2 Background... 4 3 Program objectives... 5 4 Program description... 5 5 Program scope...

More information

Executive Summary. The process. Intended use

Executive Summary. The process. Intended use ASIS Scouting the Future Summary: Terror attacks, data breaches, ransomware there is constant need for security, but the form it takes is evolving in the face of new technological capabilities and social

More information

Science and Innovation Policies at the Digital Age. Dominique Guellec Science and Technology Policy OECD

Science and Innovation Policies at the Digital Age. Dominique Guellec Science and Technology Policy OECD Science and Innovation Policies at the Digital Age Dominique Guellec Science and Technology Policy OECD Grenoble, December 2 2016 Structure of the Presentation What does digitalisation mean for science

More information

Universal Currency [UNIT] UNITCOIN a decentralized, peer-to-peer digital currency. Abstract

Universal Currency [UNIT] UNITCOIN a decentralized, peer-to-peer digital currency. Abstract Universal Currency [UNIT] UNITCOIN a decentralized, peer-to-peer digital currency. Abstract In the age of globalization, things are changing rapidly. In the past decade, technology has an unavoidable role

More information

ServDes Service Design Proof of Concept

ServDes Service Design Proof of Concept ServDes.2018 - Service Design Proof of Concept Call for Papers Politecnico di Milano, Milano 18 th -20 th, June 2018 http://www.servdes.org/ We are pleased to announce that the call for papers for the

More information

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Lecture 7 Ethics, Privacy, and Politics in the Age of Data Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc

More information

Front Digital page Strategy and Leadership

Front Digital page Strategy and Leadership Front Digital page Strategy and Leadership Who am I? Prof. Dr. Bob de Wit What concerns me? - How to best lead a firm - How to design the strategy process - How to best govern a country - How to adapt

More information

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación

More information

What is Digital Literacy and Why is it Important?

What is Digital Literacy and Why is it Important? What is Digital Literacy and Why is it Important? The aim of this section is to respond to the comment in the consultation document that a significant challenge in determining if Canadians have the skills

More information

(Beijing, China,25 May2017)

(Beijing, China,25 May2017) Remarks by the Secretary General of the International Civil Aviation Organization (ICAO), Dr. Fang Liu, to the First Session of the 2017 China Civil Aviation Development Forum: New Opportunities for Aviation

More information

TRACING THE EVOLUTION OF DESIGN

TRACING THE EVOLUTION OF DESIGN TRACING THE EVOLUTION OF DESIGN Product Evolution PRODUCT-ECOSYSTEM A map of variables affecting one specific product PRODUCT-ECOSYSTEM EVOLUTION A map of variables affecting a systems of products 25 Years

More information

Exploring the Nature of Virtuality An Interplay of Global and Local Interactions

Exploring the Nature of Virtuality An Interplay of Global and Local Interactions 25 Exploring the Nature of Virtuality An Interplay of Global and Local Interactions Niki Panteli^ Mike Chiasson^, Lin Yan^, Angeliki Poulymenakou'*, Anthony Papargyris^ 1 University of Bath, UK; N.Panteli@bath.ac.uk

More information

CHAPTER 1: INTRODUCTION. Multiagent Systems mjw/pubs/imas/

CHAPTER 1: INTRODUCTION. Multiagent Systems   mjw/pubs/imas/ CHAPTER 1: INTRODUCTION Multiagent Systems http://www.csc.liv.ac.uk/ mjw/pubs/imas/ Five Trends in the History of Computing ubiquity; interconnection; intelligence; delegation; and human-orientation. http://www.csc.liv.ac.uk/

More information

WHITE PAPER A Global Crypto currency

WHITE PAPER A Global Crypto currency WHITE PAPER A Global Crypto currency CONTENTS 1. Introduction a. What is Capricot Coin 2. Capricot Coin Specification 3. Capricot Coin Distribution a. Capricot Coin Pre Sale b. Capricot Coin Pre Sale Target

More information

Framework Programme 7

Framework Programme 7 Framework Programme 7 1 Joining the EU programmes as a Belarusian 1. Introduction to the Framework Programme 7 2. Focus on evaluation issues + exercise 3. Strategies for Belarusian organisations + exercise

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense

More information

Please send your responses by to: This consultation closes on Friday, 8 April 2016.

Please send your responses by  to: This consultation closes on Friday, 8 April 2016. CONSULTATION OF STAKEHOLDERS ON POTENTIAL PRIORITIES FOR RESEARCH AND INNOVATION IN THE 2018-2020 WORK PROGRAMME OF HORIZON 2020 SOCIETAL CHALLENGE 5 'CLIMATE ACTION, ENVIRONMENT, RESOURCE EFFICIENCY AND

More information

A Study of Emergent Norm Formation in Online Crowds

A Study of Emergent Norm Formation in Online Crowds A Study of Emergent Norm Formation in Online Crowds Nargess Tahmasbi University of Nebraska at Omaha narjestahmasbi@unomaha.edu Emergent Research Forum papers Gert-Jan de Vreede University of Nebraska

More information

Metrology in the Digital Transformation

Metrology in the Digital Transformation Metrology in the Digital Transformation This project proposal is about to establish a European metrology data infrastructure, a European Metrology Cloud to support the processes of conformity assessment

More information

Engaging UK Climate Service Providers a series of workshops in November 2014

Engaging UK Climate Service Providers a series of workshops in November 2014 Engaging UK Climate Service Providers a series of workshops in November 2014 Belfast, London, Edinburgh and Cardiff Four workshops were held during November 2014 to engage organisations (providers, purveyors

More information

Copyright: Conference website: Date deposited:

Copyright: Conference website: Date deposited: Coleman M, Ferguson A, Hanson G, Blythe PT. Deriving transport benefits from Big Data and the Internet of Things in Smart Cities. In: 12th Intelligent Transport Systems European Congress 2017. 2017, Strasbourg,

More information

NCRIS Capability 5.7: Population Health and Clinical Data Linkage

NCRIS Capability 5.7: Population Health and Clinical Data Linkage NCRIS Capability 5.7: Population Health and Clinical Data Linkage National Collaborative Research Infrastructure Strategy Issues Paper July 2007 Issues Paper Version 1: Population Health and Clinical Data

More information

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017 DHS SCIENCE AND TECHNOLOGY Briefing for NPSTC 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE September 6, 2017 Sridhar Kowdley Program Manager First Responders Group Science and Technology Directorate

More information

ENABLERS FOR DIGITAL GOVERNMENT: A DATA DRIVEN PUBLIC SECTOR

ENABLERS FOR DIGITAL GOVERNMENT: A DATA DRIVEN PUBLIC SECTOR DigiGov 30 November 2016, Kistamässan ENABLERS FOR DIGITAL GOVERNMENT: A DATA DRIVEN PUBLIC SECTOR Realising the digital transformation Barbara Ubaldi Senior Project Manager/Senior Policy Analyst Digital

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

Biography. Brian E. Klein Century Park East Sixteenth Floor Los Angeles CA t

Biography. Brian E. Klein Century Park East Sixteenth Floor Los Angeles CA t Biography Brian Klein is an accomplished trial attorney who has successfully litigated in federal and state court. His practice focuses on highstakes criminal and regulatory defense matters and civil litigation,

More information

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA Qian Xu *, Xianxue Meng Agricultural Information Institute of Chinese Academy

More information

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011 Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011 Editor-in-Chief Jeremiah Spence Image Art!"##$%"#&&'()*+,-*.)/%0.1+2' ' ' ' ' ' ' ' ',..34556-789)5/:;

More information

Oxford Fintech Programme

Oxford Fintech Programme Oxford Fintech Programme In recognition of both the threats facing traditional banking careers, and the myriad opportunities emerging in the fintech space, Saïd Business School, University of Oxford, has,

More information

Cisco Live Healthcare Innovation Roundtable Discussion. Brendan Lovelock: Cisco Brad Davies: Vector Consulting

Cisco Live Healthcare Innovation Roundtable Discussion. Brendan Lovelock: Cisco Brad Davies: Vector Consulting Cisco Live 2017 Healthcare Innovation Roundtable Discussion Brendan Lovelock: Cisco Brad Davies: Vector Consulting Health Innovation Session: Cisco Live 2017 THE HEADLINES Healthcare is increasingly challenged

More information

The Howey Test: Are Crypto-Assets Investment Contracts?

The Howey Test: Are Crypto-Assets Investment Contracts? University of Miami Law School University of Miami School of Law Institutional Repository University of Miami Business Law Review 12-19-2018 The Howey Test: Are Crypto-Assets Investment Contracts? Justin

More information

TOURISM INSIGHT FRAMEWORK GENERATING KNOWLEDGE TO SUPPORT SUSTAINABLE TOURISM. IMAGE CREDIT: Miles Holden

TOURISM INSIGHT FRAMEWORK GENERATING KNOWLEDGE TO SUPPORT SUSTAINABLE TOURISM. IMAGE CREDIT: Miles Holden TOURISM INSIGHT FRAMEWORK GENERATING KNOWLEDGE TO SUPPORT SUSTAINABLE TOURISM IMAGE CREDIT: Miles Holden Prioritise insight to generate knowledge Insight is the lifeblood of the New Zealand tourism industry.

More information

Proposal for Workshop

Proposal for Workshop The 26th European Conference on Information Systems 23 28 June 2018 Proposal for Workshop Title of the workshop Platformization in the Public Sector: Please visit: www.platformization.org Main Contact

More information

We re on the winning track! REGIONAL INNOVATION STRATEGY FOR EAST SWEDEN

We re on the winning track! REGIONAL INNOVATION STRATEGY FOR EAST SWEDEN We re on the winning track! REGIONAL INNOVATION STRATEGY FOR EAST SWEDEN Together, we become stronger! In this leaflet you will find a brief description of the Regional Innovation Strategy for East Sweden,

More information

ICT10 - Collective Awareness Platforms for Sustainability and Social Innovation

ICT10 - Collective Awareness Platforms for Sustainability and Social Innovation ICT10 - Collective Awareness Platforms for Sustainability and Social Innovation examples of "collective awareness platforms" (including FP7 CAPS) Collaborative Consumption: lending, exchange, swapping

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

NATO-CCMS PILOT STUDY

NATO-CCMS PILOT STUDY NATO CCMS NATO-CCMS PILOT STUDY on FOOD CHAIN SECURITY (FCS) Prof.Dr. Beyazıt Çırakoğlu School of Medicine Marmara University Istanbul, TURKEY CCMS Key Objectives Reducing the environmental impact of military

More information

Socio-cognitive Engineering

Socio-cognitive Engineering Socio-cognitive Engineering Mike Sharples Educational Technology Research Group University of Birmingham m.sharples@bham.ac.uk ABSTRACT Socio-cognitive engineering is a framework for the human-centred

More information